Crypto-currencies (bitcoin et al) have caught the attention of Governments, enforcement agencies, geeks and the general public.
This document provides a simple introduction to crypto-currencies and briefly introduces terms such as cryptography, hash functions, proof-of-work, digital signatures, mining, merkle root & tree, crypto-currency addresses and wallets.
This document is intended for the novice reader and may suffer from errors inherent when a complex topic is (over?) simplified.
Introduction to blockchain and crypto currenciesRohas Nagpal
The Blockchain technology has received tremendous attention over the last couple of years.Key benefits of blockchains include immutability and decentralisation.
Reserve Bank of India has said that "With its potential to fight counterfeiting, the 'blockchain' is likely to bring about a major transformation in the functioning of financial markets, collateral identification (land records for instance) and payments system".
This presentation introduces the blockchain technology.
The best smart contract platforms in 2021OliviaJune1
The smart contract has become a game-changer in the industry. Contract delivery and payout have both changed dramatically as a result. Only Ethereum was once considered to be the only platform for creating smart contracts
Introduction to blockchain and crypto currenciesRohas Nagpal
The Blockchain technology has received tremendous attention over the last couple of years.Key benefits of blockchains include immutability and decentralisation.
Reserve Bank of India has said that "With its potential to fight counterfeiting, the 'blockchain' is likely to bring about a major transformation in the functioning of financial markets, collateral identification (land records for instance) and payments system".
This presentation introduces the blockchain technology.
The best smart contract platforms in 2021OliviaJune1
The smart contract has become a game-changer in the industry. Contract delivery and payout have both changed dramatically as a result. Only Ethereum was once considered to be the only platform for creating smart contracts
Contracts Across Coins - Smart Contracts for Bitcoin, Ripple and the altcoinsRipple Labs
Held at Coin Congress in San Francisco on Thursday, July 24th, 2014.
Codius is a set of tools for building smart contracts that work with any blockchain and even work with any other service connected to the Internet.
https://www.meetup.com/bitcoin-barcelona/events/236961113/?eventId=236961113&chapter_analytics_code=UA-68616111-1
What is a "Smart Contract"?
What Smart Contracts are useful for?
How to improve business processes using Smart Contracts?
Originally presented on November 5, 2014 at the Inaugural CAIA-SKBI Cryptocurrency Conference 2014 hosted at Singapore Management University: http://skbi.smu.edu.sg/conference/111726?itemid=5806
Citations and references found in the notes of each slide.
Abstract:
With nearly six years of empirical data and use-cases behind the Nakamoto consensus method the community has observed that a cryptocurrency economy behaves differently than originally envisioned and intended. What has arisen from these half-a-decade of physical interactions is a nearly complete rollback of the primary attributes embodied within the first of these Nakamoto consensus protocols, Bitcoin – to the point where it may best to refer to it as Bitcoin-in-name-only (BINO). Consequently there are two other challenges within this existing BINO framework: (1) the diametrically opposed forces of speculative demand versus transactional demand; (2) decoupling coins from the ledger altogether. This presentation discusses several proposed solutions to the challenges currently being devised by a multitude of teams.
There are many cryptocurrencies out there; in fact, as of April 2021, there were over 9,500 cryptocurrencies in circulation listed on the Coinmarketcap. This number is expected to increase in the future as people’s interest in cryptocurrencies keeps rising. Although you might have heard about cryptocurrencies and known how it works, it’s possible you still don’t know what cryptocurrency actually is, or what means. The fields of cryptocurrency and the blockchain technology that drives cryptocurrencies can be a bit confusing. So, what is cryptocurrency? This article uses relatable terminology to explain in detail what cryptocurrency is, and the science of cryptography that decentralizes and drives cryptocurrencies, and makes them secure.
Primer to smart contracts, smart property, trustless asset managementTim Swanson
Companion video at: http://youtu.be/VDRYZ122mXA
Tim Swanson discusses cryptocurrencies, cryptoledgers, smart contracts, smart property, decentralized autonomous organizations and cryptobarter. There are footnotes included as well. Filmed at Hacker Dojo on February 14, 2014 during Ethereum meetup. More info at: www.ofnumbers.com
This applies to all the valuable exchanges which happen in our life. If you need a document or an agreement to be prepared, in real life, you will have to take the services of a lawyer, pay them a fee, and get the document from them.
The Tokenization of Everything - SAP Central Bank Executive Summit 2019Todd McDonald
This is a recent presentation that I gave at the SAP Central Bank Executive Summit 2019 in Frankfurt (many thanks to our hosts at SAP for inviting R3 to present). The topic is 'The Tokenization of Everything' which extends upon some recent talks that I have given about digital assets and tokens representing the third revolution of blockchain tech (after censorship resistant cryptocurrencies and the 'what I see is what you see' single source of truth of enterprise blockchains). This takes a slight twist on that approach by positioning how both asset tokens and value tokens provide value on their own...but will be most powerful when deployed and used together to achieve lower risk and friction settlement (atomic DvP). Hope you enjoy and as always feedback is welcome.
HashCash Consultants is a global blockchain company. Their products enable enterprises to move assets and settle payments across borders in real-time for Remittances, Trade Finance, Payment Processing and more. The company runs US-based digital asset exchange, PayBito & digital asset payment processor, BillBitcoins. They also offer exchange and payment processor software solutions, ICO services and customized use cases. HashCash solves the toughest challenges by executing innovative digital transformation strategies for clients around the world.
With the recent crypto bubble engulfing the world, you would have come across two prominent words: Blockchain and Cryptocurrency. Well, when it comes to origin and development then cryptocurrency marks the growth of Blockchain technology.
Understand Crypto currencies, where to buy them, how to secure owned currencies and investment options. Presentation will give ideas to start investigating and exploration.
Hacking the-world-20-jan-2016 by Rohas NagpalTechXpla
These are slides of presentation by Rohas Nagpal, President, Asian School of Cyber Laws at CSI event IT2020 in Mumbai held on 21st Jan LinkedIN ID https://www.linkedin.com/in/rohasnagpal ; Here he explains various cases of hacking.
Contracts Across Coins - Smart Contracts for Bitcoin, Ripple and the altcoinsRipple Labs
Held at Coin Congress in San Francisco on Thursday, July 24th, 2014.
Codius is a set of tools for building smart contracts that work with any blockchain and even work with any other service connected to the Internet.
https://www.meetup.com/bitcoin-barcelona/events/236961113/?eventId=236961113&chapter_analytics_code=UA-68616111-1
What is a "Smart Contract"?
What Smart Contracts are useful for?
How to improve business processes using Smart Contracts?
Originally presented on November 5, 2014 at the Inaugural CAIA-SKBI Cryptocurrency Conference 2014 hosted at Singapore Management University: http://skbi.smu.edu.sg/conference/111726?itemid=5806
Citations and references found in the notes of each slide.
Abstract:
With nearly six years of empirical data and use-cases behind the Nakamoto consensus method the community has observed that a cryptocurrency economy behaves differently than originally envisioned and intended. What has arisen from these half-a-decade of physical interactions is a nearly complete rollback of the primary attributes embodied within the first of these Nakamoto consensus protocols, Bitcoin – to the point where it may best to refer to it as Bitcoin-in-name-only (BINO). Consequently there are two other challenges within this existing BINO framework: (1) the diametrically opposed forces of speculative demand versus transactional demand; (2) decoupling coins from the ledger altogether. This presentation discusses several proposed solutions to the challenges currently being devised by a multitude of teams.
There are many cryptocurrencies out there; in fact, as of April 2021, there were over 9,500 cryptocurrencies in circulation listed on the Coinmarketcap. This number is expected to increase in the future as people’s interest in cryptocurrencies keeps rising. Although you might have heard about cryptocurrencies and known how it works, it’s possible you still don’t know what cryptocurrency actually is, or what means. The fields of cryptocurrency and the blockchain technology that drives cryptocurrencies can be a bit confusing. So, what is cryptocurrency? This article uses relatable terminology to explain in detail what cryptocurrency is, and the science of cryptography that decentralizes and drives cryptocurrencies, and makes them secure.
Primer to smart contracts, smart property, trustless asset managementTim Swanson
Companion video at: http://youtu.be/VDRYZ122mXA
Tim Swanson discusses cryptocurrencies, cryptoledgers, smart contracts, smart property, decentralized autonomous organizations and cryptobarter. There are footnotes included as well. Filmed at Hacker Dojo on February 14, 2014 during Ethereum meetup. More info at: www.ofnumbers.com
This applies to all the valuable exchanges which happen in our life. If you need a document or an agreement to be prepared, in real life, you will have to take the services of a lawyer, pay them a fee, and get the document from them.
The Tokenization of Everything - SAP Central Bank Executive Summit 2019Todd McDonald
This is a recent presentation that I gave at the SAP Central Bank Executive Summit 2019 in Frankfurt (many thanks to our hosts at SAP for inviting R3 to present). The topic is 'The Tokenization of Everything' which extends upon some recent talks that I have given about digital assets and tokens representing the third revolution of blockchain tech (after censorship resistant cryptocurrencies and the 'what I see is what you see' single source of truth of enterprise blockchains). This takes a slight twist on that approach by positioning how both asset tokens and value tokens provide value on their own...but will be most powerful when deployed and used together to achieve lower risk and friction settlement (atomic DvP). Hope you enjoy and as always feedback is welcome.
HashCash Consultants is a global blockchain company. Their products enable enterprises to move assets and settle payments across borders in real-time for Remittances, Trade Finance, Payment Processing and more. The company runs US-based digital asset exchange, PayBito & digital asset payment processor, BillBitcoins. They also offer exchange and payment processor software solutions, ICO services and customized use cases. HashCash solves the toughest challenges by executing innovative digital transformation strategies for clients around the world.
With the recent crypto bubble engulfing the world, you would have come across two prominent words: Blockchain and Cryptocurrency. Well, when it comes to origin and development then cryptocurrency marks the growth of Blockchain technology.
Understand Crypto currencies, where to buy them, how to secure owned currencies and investment options. Presentation will give ideas to start investigating and exploration.
Hacking the-world-20-jan-2016 by Rohas NagpalTechXpla
These are slides of presentation by Rohas Nagpal, President, Asian School of Cyber Laws at CSI event IT2020 in Mumbai held on 21st Jan LinkedIN ID https://www.linkedin.com/in/rohasnagpal ; Here he explains various cases of hacking.
View the IT Act 2000
Preliminary
Digital Signature
Electronic Governance
Attribution, Acknowledgement and Dispatch of Electronic Records
Secure Electronic Records and Secure Digital Signatures
Regulation of Certifying Authorities
Digital Signature Certificates
Duties of Subscribers
Penalties and Adjudication
The Cyber Regulations Appellate Tribunal
Offences
Network Service Providers Not to be Liable in Certain Cases
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
“As a layperson -let us understand- cryptocurrency and how it works.pdfRAVI TIKU
All of us listen so much about the cryptocurrency and its usage being done for the various transactions, but we still don’t know the basics of this currency and how it is transacted, and under which regulatory board or exchange their indices are maintained. I thought let us discuss the simple basics of the same and try to understand what exactly it is and how it affects the transactional market internationally.
I performed a 3-hour educational session at Etopía, Zaragoza, for artists enrolled in the ARTeCHÓ international program. I shared important internal details about smart contracts, the ERC-721 standard, and how to link market and NFT contracts.
What are NFTs?
Non-fungible tokens (NFTs) are unique digital assets that are verified on a blockchain network. This means that NFTs cannot be replicated or replaced, and they can be used to represent ownership of digital items such as artwork, music, videos, and other types of digital content.
How do NFTs work?
NFTs are created by minting them on a blockchain. Minting is the process of creating a new token and adding it to the blockchain. Once an NFT is minted, it cannot be changed or deleted.
To mint an NFT, you will need to create a digital wallet and connect it to a blockchain marketplace. Once you have connected your wallet, you can upload your digital file and create an NFT listing.
When someone purchases your NFT, the transaction will be recorded on the blockchain and the NFT will be transferred to their wallet. The new owner of the NFT will now have full ownership of the digital asset.
What are the benefits of NFTs?
Ownership: NFTs provide a way to prove ownership of digital assets. This is important because digital assets can be easily copied and distributed without the owner's permission.
Monetization: NFTs can be used to monetize digital content. For example, artists can sell their artwork as NFTs, and musicians can sell their music as NFTs.
Community: NFTs can be used to build communities around digital assets. For example, a group of fans could purchase an NFT from their favorite artist, and this would give them access to exclusive content or experiences.
Examples of NFTs
Artwork: One of the most popular uses of NFTs is to represent ownership of digital artwork. Some famous artists have sold their artwork as NFTs for millions of dollars.
Music: NFTs can also be used to represent ownership of digital music. Some musicians have sold their music as NFTs, and this has allowed them to bypass traditional record labels and connect directly with their fans.
Videos: NFTs can also be used to represent ownership of digital videos. For example, some video game companies have sold in-game items as NFTs.
Collectibles: NFTs can also be used to represent ownership of digital collectibles. For example, some sports leagues have sold trading cards as NFTs.
Conclusion
NFTs are a new and emerging technology with the potential to revolutionize the way we own and interact with digital assets. NFTs are still in their early stages of development, but they have the potential to change the way we create, consume, and invest in digital content.
Additional Information
The slides also included information on the following topics:
The different types of NFTs
How to create and sell NFTs
The different blockchain platforms that support NFTs
The environmental impact of NFTs
The future of NFTs
CRYPTOCURRENCY :HOW IT'S WORK,ADVANTAGES AND DISADVANTAGES.pdfBharata chandra Sahu
INTRODUCTION OF CRYPTOCURRENCY
Currency, crypto- currency, crypto, or coin is a digital forex designed to work as a medium of trade via a pc community that isn't always reliant on any central authority, comparable as a authorities or bank, to uphold or hold it
Cryptocurrency, every now and then known as crypto- foreign money or crypto, is any shape of forex that exists digitally or almost and makes use of cryptography to invulnerable deals. Cryptocurrencies do no longer have a central issuing or regulating authority, alternatively the use of a decentralized machine to file offers and difficulty new units.
What Is Cryptocurrency?
A cryptocurrency is a digital or digital foreign money that is secured via cryptography, which makes it almost insolvable to pretend or double- spend. severa cryptocurrencies are decentralized networks grounded on blockchain science — a dispensed tally completed via a far-off community of computers. A defining factor of cryptocurrencies is that they're normally no longer issued by using any central authority, rendering them theoretically susceptible to authorities quandary or manipulation.
Cryptocurrency is a digital fee machine that does now not calculate on banks to corroborate deals. It’s a peer- to- peer machine that can allow each person somewhere to shoot and admit payments. alternatively of being bodily plutocrat carried round and modified in the actual world, cryptocurrency repayments stay in simple terms as digital entries to an on-line database describing particular deals. When you switch cryptocurrency finances, the offers are recorded in a public tally. Cryptocurrency is saved in digital holdalls .
The Cryptocurrency and Regulation of Official Digital Currency Bill 2021 is probably to be added in the downtime session of the Parliament. It's a invoice that would adjust Cryptocurrency in India. On December 7 2021, Finance minister Nirmala Sitharaman asserted that the the proposed Central Bank Digital Currency may not increase cryptocurrency in India.
Are Cryptocurrencies Legal?
Fiat currencies figure out their authority as mediums of sale from the authorities or monetary authorities. For illustration, every bone invoice is aided with the aid of the Federal Reserve.
But cryptocurrencies don't seem to be backed via any public or personal realities. thus, it has been subtle to make a case for their prison repute in exclusive fiscal authorities all through the world. It does no longer assist things that cryptocurrencies have generally labored outdoor utmost being fiscal structure. The prison repute of cryptocurrencies has counteraccusations for their use in diurnal offers and trading. In June 2019, the Financial Action Task Force( FATF) endorsed that line transfers of cryptocurrencies need to be problem to the prerequisites of its outing Rule, which requires AML compliance.
As of December 2021, El Salvador used to be the solely united states in the world to enable Bitcoin as criminal soft for monetary deals.
What is Cryptocurrency and Why is it Important?
Cryptocurrency is a revolutionary digital or virtual form of currency that utilizes cryptographic techniques to secure financial transactions and control the creation of new units. It is decentralized, meaning it is not controlled by any central authority, such as a government or a central bank, which sets it apart from traditional fiat currencies like the US dollar or the euro. Instead, cryptocurrencies rely on a technology called blockchain, a distributed ledger that records all transactions across a network of computers.
The emergence of cryptocurrency, spearheaded by the creation of Bitcoin in 2009 by an anonymous entity known as Satoshi Nakamoto, has ushered in a new era of financial innovation and digital commerce. Bitcoin was the first cryptocurrency and remains the most well-known and valuable, but it has since been joined by thousands of other cryptocurrencies, each with its own unique features and use cases. Ethereum, for instance, introduced the concept of smart contracts, allowing for self-executing agreements with no need for intermediaries.
In an era of rapid technological advancements, understanding cryptocurrencies is no longer optional; it's a necessity. Our guide is meticulously designed to cater to both beginners and seasoned investors, offering insights, strategies, and practical advice that will empower you to make informed decisions in this dynamic market.
Our Comprehensive Cryptocurrency Guide is your passport to the exciting and potentially lucrative world of digital assets. Whether you're looking to invest, trade, or simply broaden your financial knowledge, our guide will equip you with the skills and confidence you need to thrive in the cryptocurrency landscape.
An Introduction into Cryptocurrencies_ Understanding the Future of Digital Cu...Niall O'Riordan
Cryptocurrencies have revolutionised the world of finance, offering a digital alternative to traditional forms of currency. But what exactly are cryptocurrencies and how do they work?
10 Best Cryptocurrency to Invest in TodayHRMC Matrix
The cryptocurrency market is very volatile. So, learn properly before investing. You will find the list of the best cryptocurrency to invest in today. Bitcoin has not exclusively been a pioneer, introducing a flood of digital currencies based on a decentralized the distributed network, however, has likewise turned into the true norm for digital forms of money, motivating a steadily developing army of supporters and side projects.
The cryptocurrency market is only suitable for you if you understand it better before investing. So, first of all, find out the best cryptocurrency to invest in today.
10 Best Cryptocurrency to Invest in TodayHRMC Matrix
Cryptocurrency is a digital or virtual currency that uses cryptography for security. It operates independently of a central bank or government, and transactions are recorded on a public digital ledger called a blockchain. Bitcoin was the first decentralized cryptocurrency, and it remains the most popular and valuable. Other notable examples include Ethereum, Ripple, and Litecoin.
Cryptocurrency Benefits and Risks By Frederick Acquah.pdfFrederickAcquah7
Explore the world of cryptocurrencies in this comprehensive guide. From understanding blockchain technology to navigating risks, benefits, and investment strategies, this book equips you with the knowledge to engage safely and responsibly in the exciting realm of digital finance.
Discussed about the Blockchain and how it works
Also the advantages of Blockchain over centralized system and some drawbacks are also mentioned.
Discussion on bitcoin and Cryptocurrency
Creating our own cryptocurrency for startups.
Snapshots are attached.
A Comprehensive Guide to Digital Currency for Americans 🌐💰
Slide 1: Introduction 🚀
- Title: Navigating Digital Currency: A Comprehensive Guide for Americans 🇺🇸
- 📌 Welcome to our in-depth exploration of digital currency and its relevance for Americans.
Slide 2: Understanding Digital Currency 💡
- Definition and Core Characteristics of Digital Currency 💻💲
- How It Contrasts with Traditional Currencies 🏦🌍
- 🌟 Examples: Bitcoin, Ethereum, Ripple, Litecoin, Bitcoin Cash, Tether
Slide 3: The Advantages of Digital Currency 🙌
- Key Advantages of Digital Currency 💪📈
- Decentralization, Security, Anonymity, Accessibility, Lower Transaction Fees, Faster Transactions 🌐🔒🤐💼💰
Slide 4: Demystifying Digital Currency Operations 🛠️
- The Power of Blockchain Technology 🧱🔗
- Unveiling Mining, Digital Wallets, Transactions, and Value Dynamics 🛒🔐💸
Slide 5: A Glimpse into Digital Currency's Past 📜
- Digital Currency's Evolution: From Bitcoin's Birth in 2008 🎂
- Key Historical Milestones and Early Adoption 🚀🕰️
Slide 6: Navigating the Legal and Regulatory Landscape 🏛️
- Global Perspectives on Digital Currency Regulation 🌍📜
- Taxation, Anti-Money Laundering, Fraud, and Consumer Protection Challenges 🏦🚫💼🔒
Slide 7: Your Path to Digital Currency Investment 📈
- Step-by-Step Guide for Entering the Digital Currency Arena 💹💡
- Selecting an Exchange, Account Creation, Funding, Asset Selection, Trading, and Secure Storage 💼🔐🌐
Slide 8: Risks and Rewards 💰🌪️
- Navigating Digital Currency's Risks 🌊🚫
- Highlighting the Rewards, From Cross-Border Innovations to DeFi Opportunities 🏦🌐
Slide 9: The Role of Digital Identity 📄🔒
- Protecting Your Financial Identity with Digital Tools 🛡️📲
- Streamlining Regulatory Compliance with Digital Identity 📊👤
Slide 10: Environmental Considerations 🌱🌍
- Unpacking the Environmental Impact of Digital Currency 🌏🔌
- From Energy Consumption and Carbon Emissions to Sustainable Solutions 🍃🏭🤝
Slide 11: In Conclusion 🎯✨
- A Recap of the Digital Currency Journey 🌐💼
- Embracing the Challenges and Possibilities 🤝💼
- Envisioning a More Equitable and Prosperous Financial Future 💰🌈
Slide 12: Your Questions, Our Answers 🤔❓
- Opening the Floor for Engaging Discussions and Queries 🗣️💬
Slide 13: Get in Touch 📬🤝
- Contact Information for Further Conversations and Clarifications 📞📧
Slide 14: A Grateful Farewell 🙏🌟
- Expressing Our Appreciation for Your Participation and Interest 🙌👏
Thank you for joining us on this exciting journey through the world of digital currency! 🚀🌐💲
Cryptocurrency, also known as crypto, is a digital form of currency that utilizes cryptographic technology to secure transactions and control the creation of new units. Unlike traditional currencies issued by central authorities, cryptocurrencies operate on a decentralized network, typically based on blockchain technology. This decentralized nature ensures that transactions are recorded transparently and cannot be altered, providing increased security and trust.
Cryptocurrency has the potential to disrupt traditional financial institutions by offering alternative methods of payment and financial services. Blockchain technology can streamline processes, reduce costs, and enhance transparency in areas such as remittances, cross-border transactions, and supply chain management. Financial institutions are increasingly exploring the integration of cryptocurrency and blockchain technology to stay competitive in the evolving financial landscape.
Bitcoin and Other Digital Currencies: The Latest Issues in Regulation and Enf...Jay Postma
Presentation of October 10, 2014 by Jay Postma, CAMS and Paul Soter, Esq. during the Financial Service Centers of America (FiSCA) Annual Conference. Covering basics of digital currencies, bitcoin, regulatory and compliance issues, including BSA/AML, OFAC, etc.
This article describes basics of cryptocurrency, it's definition, it's origin and evolution of this term etc. This article belongs to the glossary of decentralised technosocial systems, a special
section of Internet Policy Review.
Don't invest in crypto currencies till you read The Future Money Playbook. Topics include:
1. History of Money
2. Tech terms
3. Smart contracts
4. DeFi
5. Stablecoins
6. Central Bank Digital Currency
7. eMoney
8. Prime Crypto Currencies (BTC, BCH, BSV, ETH, ETC, XRP, XLM, LTC, ADA, EOS)
9. Prime Stablecoins (BUSD, Diem)
10. Crypto Wallets
11. Crypto Custody
12. How to keep your crypto safe
13. Crypto Resources
Get 150+ pages of actionable insights for smarketing - smart & aligned sales & marketing.
Mike Tyson once said that everybody has a plan until they get punched in the mouth.
The coronavirus has punched us all – humans and businesses.
We need a new plan.
The old sales & marketing techniques are not going to survive 2020.
Welcome to the world of Smarketing – smart aligned sales & marketing.
B2B Digital Marketing Playbook for the COVID EraRohas Nagpal
Customers have changed.
Spending patterns have changed.
People's priorities have changed.
How people spend their time has changed.
So naturally, marketing techniques
NEED TO CHANGE.
The "B2B Digital Marketing Playbook for the COVID Era" recommends an 11-point approach:
1. Understand what you are selling
2. Understand whom you are selling to
3. Design your digital marketing strategy
4. Optimize your website
5. Incentivize influencers
6. Optimize your digital marketing assets
7. Distribute your digital marketing assets
8. Make it easy for potential customers to contact you
9. Aim for a 60-second response time
10. Use dynamic QR codes
11. Use Artificial Intelligence
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1. 1
Math Money: A simple introduction to crypto-currencies
Rohas Nagpal
Asian School of Cyber Laws
rn@asianlaws.org
Abstract: Crypto-currencies (bitcoin et al) have caught the attention of
Governments, enforcement agencies, geeks and the general public. This
document provides a simple introduction to crypto-currencies and briefly
introduces terms such as cryptography, hash functions, proof-of-work, digital
signatures, mining, merkle root & tree, crypto-currency addresses and wallets.
This document is intended for the novice reader and may suffer from errors
inherent when a complex topic is (over?) simplified.
Note: Although this document mentions Bitcoin, most of it applies to any system
that “uses public key cryptography, peer-to-peer networking and proof-of-work
to process and verify payments”.
Note: This document is intended for the novice reader and may suffer from
errors inherent when a complex topic is (over?) simplified.
1. Evolution of money: from cowry shells to the blockchain
Our ancestors started off with the barter system - something like "I will give you
2 buffaloes in return for 5 shiny new super-sharp axes". Soon they realised that
the barter system had too many limitations - everyone didn't want buffaloes,
buffaloes were neither divisible (not too many people would want 0.35
buffaloes) nor very portable (imagine having to carry a buffalo on your shoulders
while going shopping).
So they moved on to more acceptable, divisible, homogeneous and portable
forms of money - cowry shells, salt, gold, silver and lots more. The Chinese
invention of paper eventually led to the birth of paper currency, which was
initially backed by gold or other precious metals. Then the world moved on to
fiat money - currency that's declared as legal tender by a government but not
backed by a physical commodity1.
1 Have a look at a 100-rupee note. It caries a promise signed by the Governor of the
Reserve Bank of India (RBI) – “I promise to pay the bearer the sum of one hundred
rupees”. If you were to take this note to the Governor of the RBI, he would give you coins
or one-rupee notes totaling 100 rupees. The RBI gets the power to issue currency notes
by section 31 of the Reserve Bank of India Act, 1934. This section states that “No person
in India other than the Bank or, as expressly authorized by this Act, the Central
Government shall draw, accept, make or issue any bill of exchange, hundi, promissory note
or engagement for the payment of money payable to bearer on demand, or borrow, owe or
take up any sum or sums of money on the bills, hundis or notes payable to bearer on
demand of any such person…”
2. 2
This brings us to an essential question – what is money? Money's a matter of
functions four, a Medium, a Measure, a Standard, a Store. So goes the couplet
based on William Stanley Jevons analysis of money in 1875. This meant that for
something to be called as money, it must function as a medium of exchange, a
measure of value, a standard of deferred payment and a store of value.
The birth of computers and the Internet brought in many electronic payment
systems including debit cards, stored value cards, giro transfers, credit cards,
net-banking, electronic bill payments, electronic cheques, mobile wallets, digital
gold currencies, digital wallets, electronic funds transfer at point of sale, mobile
banking, SMS banking, online banking, payment cards, real-time gross settlement
systems, SWIFT, wire transfers and more.
And then came Satoshi Nakamoto’s path breaking whitepaper - Bitcoin: A Peer-
to-Peer Electronic Cash System in October 2008. This brought the world its first
truly peer-to-peer electronic currency2 . Bitcoin earned a lot of notoriety
primarily because of its use by members of the now shut-down Silk Road - an
illegal online marketplace that facilitated the sale of hundreds of millions of
dollars worth of drugs, guns, stolen financial information, counterfeit documents
and more. All Silk Road transactions were conducted exclusively in bitcoin.
A lot of crypto-currencies3 piggybacked on Bitcoin’s underlying innovation – the
blockchain. In fact we now have more than 650 virtual currencies4 being used
2 Virtual currency is a digital representation of value that can be digitally traded and
functions as (1) a medium of exchange; and/or (2) a unit of account; and/or (3) a store
of value, but does not have legal tender status (i.e., when tendered to a creditor, is a
valid and legal offer of payment) in any jurisdiction. It is not issued nor guaranteed by
any jurisdiction, and fulfils the above functions only by agreement within the
community of users of the virtual currency. Virtual currency is distinguished from fiat
currency (a.k.a. “real currency,” “real money,” or “national currency”), which is the coin
and paper money of a country that is designated as its legal tender; circulates; and is
customarily used and accepted as a medium of exchange in the issuing country. It is
distinct from e-money, which is a digital representation of fiat currency used to
electronically transfer value denominated in fiat currency. E-money is a digital transfer
mechanism for fiat currency—i.e., it electronically transfers value that has legal tender
status. [Source: FATF report on Virtual Currencies - Key Definitions and Potential
AML/CFT Risks]
3 Cryptocurrency refers to a math-based, decentralised convertible virtual currency that
is protected by cryptography. - i.e., it incorporates principles of cryptography to
implement a distributed, decentralised, secure information economy. Cryptocurrency
relies on public and private keys to transfer value from one person (individual or entity)
to another, and must be cryptographically signed each time it is transferred. The safety,
integrity and balance of cryptocurrency ledgers is ensured by a network of mutually
distrustful parties (in Bitcoin, referred to as miners) who protect the network in
exchange for the opportunity to obtain a randomly distributed fee (in Bitcoin, a small
number of newly created bitcoins, called the “block reward” and in some cases, also
transaction fees paid by users as a incentive for miners to include their transactions in
the next block). Hundreds of cryptocurrency specifications have been defined, mostly
3. 3
around the world. And now we have become a world where bankers wake up
each morning wondering – “has the meaning of money and banking changed while
I slept”.
This rapid change in the global money ecosystem has implications for all of us -
from Governments looking to clamp down on money laundering, tax evasion and
terrorist funding to banks looking to understand the implications of the
blockchain technology. From law enforcement looking to clamp down on the
Mafia using Bitcoin to businesses looking for faster and cheaper ways to receive
and transfer money globally.
2. The mathematics of it all
Sanya’s a naughty young girl who’s been grounded for a week. She wants to
sneak out for desert with her friends but obviously can’t let her dad know about
it. She’s not allowed to use her cellphone, so the only way for her to call her
friends is using the good old landline in her dad’s room.
Since she regularly gets grounded, she and her friends have worked out a simple
system for sharing secrets. When she says, “have you read the book I told you
about” she actually means “let’s sneak out tonight”. When she says something
about “page 10” of the book, she means “pick me up at 10 pm”. Continuing the
logic, page 11 would mean 11 pm and so on.
So on the phone she asks her friend “Have you read the book I told you about?
Page 12 is really funny”, she means, “Let’s sneak out tonight, pick me up at
midnight”.
What we have just seen is cryptography (and a rebellious teenager) in action in
the real world.
The sentence “Let’s sneak out tonight, pick me up at midnight” is plain text –
what Sanya actually wants to convey. The sentence “Have you read the book I
told you about? Page 12 is really funny" is the cipher text – something that an
adversary (her dad in this case) should not be able to understand.
Encryption is the process of converting plain text to cipher text. The reverse
process is decryption.
derived from Bitcoin, which uses a proof- of-work system to validate transactions and
maintain the block chain. While Bitcoin provided the first fully implemented
cryptocurrency protocol, there is growing interest in developing alternative, potentially
more efficient proof methods, such as systems based on proof-of-stake. [Source: FATF
report on Virtual Currencies - Key Definitions and Potential AML/CFT Risks]
4 Source: www.mapofcoins.com, retrieved on 19th March, 2016.
4. 4
This science of encrypting and decrypting messages (cryptography) has been
used for thousands of years. It is believed that when Julius Caesar sent messages
to his generals, he replaced every A in his messages with a D, every B with an E,
and so on through the alphabet. Only someone who knew the “shift by 3” rule
could decipher his messages.
For example, if we want to encode the word “SECRET” using Caesar’s key value
of 3, we offset the alphabet so that the 3rd letter down, (D), begins the alphabet.
So starting with ABCDEFGHIJKLMNOPQRSTUVWXYZ
and sliding everything up by 3, you get
DEFGHIJKLMNOPQRSTUVWXYZABC
where D=A, E=B, F=C, and so on.
Using this scheme, the plaintext, “SECRET” encrypts as “VHFUHW”. To allow
someone else to read the cipher text, you tell him or her that the key is 3. This
method is called symmetric cryptography and involves using the same key for
encrypting as well as decrypting a message. This naturally poses a serious
problem – what if an adversary gets hold of this key? At some point of time the
sender and receiver need to exchange the key. That’s when an adversary could
get hold of the key. In modern cryptography, keys are really really large
numbers.
The secure-key-exchange problem was solved with the birth of asymmetric key
cryptography – in which two different but related keys are used - the public key
to encrypt data and the corresponding private key to decrypt the data. If Sanya
were to send an encrypted message to Karan, she would encrypt the message
using his public key (which is available to the world). Once encrypted, the
message can only be decrypted using Karan’s private key (which would only be
available to Karan).
To understand how this works, lets look at the RSA algorithm (named after its
inventors Ron Rivest, Adi Shamir, and Leonard Adleman).
The RSA public-key encryption algorithm works in the following manner:
1. Generation of a public-private key pair.
2. Encryption of a message (plain text) with the public key generated in step
(1) to get the cipher-text.
3. Decryption of the cipher-text by using the corresponding private key
generated in step (1).
Step 1: Generation of a key pair
1. Select two large integer primes p and q.
2. Multiply p and q to get a number n, that means, pq = n.
3. Obtain φ which is the product of (p-1) and (q-1), that means
φ = (p-1)(q-1).
5. 5
4. Select e such that 1<e<φ and the greatest common divisor of e and φ is 1.
That means e and φ are coprime.
5. Compute d such that 1<d<φ and ed ≡ 1 mod φ. This means that the value
of d must be such that ed-1 should be completely divisible by φ or
(ed-1) / φ should be an integer.
6. The public-key is (e, n) and the corresponding private key is (d, n).
Step 2: Encryption process
Suppose the message to be encrypted is m. The cipher-text c is obtained by
raising the message to the value of e and finding out its modulo n.
That means
c = me mod n.
Step 3: Decryption process
Decryption is achieved by raising the cipher-text c obtained in step 2 to the value
of d and finding out its modulo n.
That means m=cd mod n.
Let’s try the algorithm with really small prime numbers5: 3 and 11. (In reality
the primes chosen would be really really large).
1. Choose p = 3 and q = 11
2. Compute n = p * q = 3 * 11 = 33
3. Compute φ = (p - 1) * (q - 1) = 2 * 10 = 20
4. Choose e such that 1 < e < φ and e and φ are coprime. Let e = 7
5. Compute a value for d such that 1<d<φ and ed ≡ 1 mod φ.
One solution is d = 3.
6. Public key is (e, n) => (7, 33)
Private key is (d, n) => (3, 33)
7. Suppose the plain text is 2.
The cipher text will be c = me mod n.
That’s 27 mod 33 = 128 mod 33 = 29
8. The decryption will be
cd mod n
5 Source: https://www.cs.utexas.edu/~mitra/honors/soln.html
6. 6
= 293 mod 33
= 24389 mod 33
= 2
The security of the RSA cryptosystem is based on the integer factorization
problem. Any adversary who wishes to decipher the cipher-text c must do so by
using the publicly available information (n, e). One possible method is to first
factor n, and then compute φ and d just as was done in the above mentioned
steps. The factoring of n is currently computationally infeasible (provided
sufficiently large prime numbers are chosen as p and q) and therein lays the
strength of the RSA cryptosystem.
Before we get into the nuts and bolts of how crypto-currencies work, we need to
understand some more concepts including hash functions. A one-way hash
function takes an input (e.g. a PDF file, a video, an email, a string etc.) and
produces a fixed-length output e.g. 160-bits.
The hash function ensures that if the information is changed in any way – even
by just one bit – an entirely different output value is produced. The table below
shows some sample output values using the sha1 (40) hash function6.
Input Hash
sanya c75491c89395de9fa4ed29affda0e4d29cbad290
SANYA 33fef490220a0e6dee2f16c5a8f78ce491741adc
Sanya 4c391643f247937bee14c0bcca9ffb985fc0d0ba
It can be seen from the table above that by changing the input from sanya to
SANYA, an entirely different hash value is generated. What must be kept in mind
is that irrespective of the size of the input, the hash output will always be of the
same size.
Two things must be borne in mind with regard to one-way hash functions:
1. It is computationally infeasible to find two different input messages that
will yield the same hash output.
2. It is computationally infeasible to reconstruct the original message from
its hash output.
Having understood hash functions, let’s have a look at another interesting
concept called proof-of-work. This is a way to reduce spam and denial of service
attacks by requiring a computer to spend some time and processing power to
solve something.
One such proof-of-work system that is used in crypto-currencies is hashcash. The
basic premise of hashcash is that if the sender of an email can prove that she has
6 Computing hash of an electronic record is a very simple process. E.g. in php it can be
done with: hash_file('sha256', $filename).
7. 7
spent reasonable time and computational power to solve some puzzle, it can be
believed that the sender is not a spammer. The logic is that spamming would be
economically infeasible if a spammer had to spend non-trivial time and
computational power for every single email being sent.
Let’s develop an elementary proof-of-work system, based on hashcash, which
can be used to control spam. Let’s presume that rn@asianlaws.org is sending an
email to info@lexcode.com. The sender must include something similar to the
following in the header of the email:
rn@asianlaws.org: info@lexcode.com:18032016:xxxx
That’s 4 pieces of information separated by colons. The first piece is the sender’s
email address, the second is the receiver’s email address and the third is the
current date in DDMMYYYY format. The fourth piece is something that needs to
be calculated by the sender’s computer. Let’s call it a nonce.
The objective is to find an input that would result in a sha256 hash which begins
with 5 zeros.
So we start the nonce at a value of 0 and then keep incrementing it (1, 2, 3 … )
and calculating the hash. Something like this:
Input rn@asianlaws.org:info@lexcode.com:18032016:1
sha256 hash 288721860bec3a490811981c831702d4f41e54c3f8c183c5650ac73ff231659c
Input rn@asianlaws.org:info@lexcode.com:18032016:2
sha256 hash 11caf434535c35cdc843e801382f0a8643a03500649a9bfa41c8e6a4be65a413
Input rn@asianlaws.org:info@lexcode.com:18032016:3
sha256 hash aad80b9c58e977a5da90f81b2667af443b50425876920528f237df0a6ffe1aa4
And so on till .. 1580661
Input rn@asianlaws.org:info@lexcode.com:18032016:1580661
sha256 hash 0000080602f705257e74a4e847e9ed23ab61be5b2ba4263fbacc90bd7c7c7ab4
Calculating this may not take a genuine sender a lot of time and computational
power but if a spammer were to make these calculations for millions of emails, it
will take a non-trivial amount of time and computational power.
At the receiver’s end, the computer will simply take the following line from the
header of the email and calculate the hash.
rn@asianlaws.org:info@lexcode.com:18032016:1580661
If the hash begins with a pre-defined number of zeros (5 in this example), the
email would not be considered spam. This will take the receiver a trivial amount
of time and computational power since it just has to calculate the hash of one
8. 8
input. The date can be used as an additional validation parameter – e.g. if the
date is within 24 hours of the time of receipt, the email will be approved for
download.
A very important application of public key cryptography is a digital signature.
In this, the signer first calculates the hash of the message she wants to digitally
sign. Then using her private key and the hash, she creates a digital signature,
using the relevant algorithm.
This digital signature is unique to the message.
The signer then sends the message and the digital signature to the receiver. The
receiver re-computes the hash from the message. The receiver also computes
another string using the digital signature and the signer’s public key (using the
relevant algorithm). If this string and the hash match, the digital signature is
verified.
Blind digital signatures were subsequently developed for use in digital cash
and cryptographic voting systems. In this system, the content of the message is
disguised before it is signed. The resulting blind signature can be verified against
the original, un-blinded message in the manner of a regular digital signature7.
However, blind digital signatures do not solve the double-spending problem. In
case of physical currency notes, you cannot double-spend a note because once
you hand the note over to someone, you don’t have the note anymore to spend
again. Since electronic records are easily duplicated, a “digital coin” can be spent
multiple times.
Bitcoin solves the double-spending problem through the blockchain - a public
ledger containing an ordered and time-stamped record of transactions. In
addition to preventing double-spending, the blockchain prevents the
modification of previous transaction records.
A block of one or more new transactions is collected into the transaction data
part of a block. Copies of each transaction are hashed, and the hashes are then
7 Source: https://en.wikipedia.org/wiki/Blind_signature. An often-used analogy to the
cryptographic blind signature is the physical act of a voter enclosing a completed
anonymous ballot in a special carbon paper lined envelope that has the voter's
credentials pre-printed on the outside. The ballot can be marked through the envelope
by the carbon paper. The voter hands the sealed envelope to an official who verifies the
credentials and signs it. Once signed, the package is given back to the voter, who
transfers the now signed ballot to a new unmarked normal envelope. Thus, the signer
does not view the message content, but a third party can later verify the signature and
know that the signature is valid within the limitations of the underlying signature
scheme.
10. 10
block chain, a Bitcoin miner must successfully hash a block header to a value
below the target threshold. Bitcoin miners spend a lot of money (for
computational power and electricity) and are compensated by way of a reward
for each block they mine – this was initially 50 bitcoins per block and is halving
every 210,000 blocks. Miners also earn transaction fees. Miners usually operate
as part of a large pool instead of as individuals.
Interestingly, Bitcoins can be also be mined with a pencil and paper9.
The first-ever Bitcoin block is known as the genesis block. Each subsequent
block is addressed by its block height, which represents the number of blocks
between it and the genesis block.
New blocks are added to the block chain if their hash is at least as challenging as
a difficulty value expected by the Bitcoin consensus protocol. According to the
bitcoin protocol, it should take 2 weeks for 2016 blocks to be generated. If the
time taken is more or less than 2 weeks then the difficulty value is relatively
decreased or increased.
The overview of the Bitcoin process is explained very well on Ken Shirriff's
blog10.
9 See: http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html
10 To simplify slightly, bitcoins consist of entries in a distributed database that keeps
track of the ownership of bitcoins. Unlike a bank, bitcoins are not tied to users or
accounts. Instead bitcoins are owned by a Bitcoin address, for example
1KKKK6N21XKo48zWKuQKXdvSsCf95ibHFa. A transaction is the mechanism for
spending bitcoins. In a transaction, the owner of some bitcoins transfers ownership to a
new address. A key innovation of Bitcoin is how transactions are recorded in the
distributed database through mining. Transactions are grouped into blocks and about
every 10 minutes a new block of transactions is sent out, becoming part of the
transaction log known as the blockchain, which indicates the transaction has been made
(more-or-less) official. Bitcoin mining is the process that puts transactions into a block,
to make sure everyone has a consistent view of the transaction log. To mine a block,
miners must find an extremely rare solution to an (otherwise-pointless) cryptographic
problem. Finding this solution generates a mined block, which becomes part of the
official block chain.
Mining is also the mechanism for new bitcoins to enter the system. When a block
is successfully mined, new bitcoins are generated in the block and paid to the miner.
This mining bounty is large - currently 25 bitcoins per block. In addition, the miner gets
any fees associated with the transactions in the block. Because of this, mining is very
competitive with many people attempting to mine blocks. The difficulty and
competitiveness of mining is a key part of Bitcoin security, since it ensures that nobody
can flood the system with bad blocks.
There is no centralized Bitcoin server. Instead, Bitcoin runs on a peer-to-peer
network. If you run a Bitcoin client, you become part of that network. The nodes on the
network exchange transactions, blocks, and addresses of other peers with each other.
When you first connect to the network, your client downloads the blockchain from some
random node or nodes. In turn, your client may provide data to other nodes. When you
create a Bitcoin transaction, you send it to some peer, who sends it to other peers, and
so on, until it reaches the entire network. Miners pick up your transaction, generate a
11. 11
A Bitcoin address is an identifier of 26 to 35 alphanumeric characters, beginning
with the number 1 or 3, which represents a possible destination for a bitcoin
payment. Addresses can be generated at no cost by any user of Bitcoin11.
mined block containing your transaction, and send this mined block to peers. Eventually
your client will receive the block and your client shows that the transaction was
processed.
Bitcoin uses digital signatures to ensure that only the owner of bitcoins can
spend them. The owner of a Bitcoin address has the private key associated with the
address. To spend bitcoins, they sign the transaction with this private key, which proves
they are the owner. (It's somewhat like signing a physical check to make it valid.) A
public key is associated with each Bitcoin address, and anyone can use it to verify the
digital signature.
Blocks and transactions are identified by a 256-bit cryptographic hash of their
contents. This hash value is used in multiple places in the Bitcoin protocol. In addition,
finding a special hash is the difficult task in mining a block.
11 Source: https://en.bitcoin.it/wiki/Address. The technical process to create Bitcoin
addresses is explained as under:
• Step 0: Having a private Elliptic Curve Digital Signature Algorithm key:
18E14A7B6A307F426A94F8114701E7C8E774E7F9A47E2C2035DB29A206321725
• Step 1: Take the corresponding public key generated with it:
0450863AD64A87AE8A2FE83C1AF1A8403CB53F53E486D8511DAD8A04887E5B2352
2CD470243453A299FA9E77237716103ABC11A1DF38855ED6F2EE187E9C582BA6
• Step 2: Perform SHA-256 hashing on the public key
600FFE422B4E00731A59557A5CCA46CC183944191006324A447BDB2D98D4B408
• Step 3: Perform RIPEMD-160 hashing on the result of SHA-256
010966776006953D5567439E5E39F86A0D273BEE
• Step 4: Add version byte in front of RIPEMD-160 hash (0x00 for Main Network)
00010966776006953D5567439E5E39F86A0D273BEE
(note that below steps are the Base58Check encoding11)
• Step 5: Perform SHA-256 hash on the extended RIPEMD-160 result
445C7A8007A93D8733188288BB320A8FE2DEBD2AE1B47F0F50BC10BAE845C094
• Step 6: Perform SHA-256 hash on the result of the previous SHA-256 hash
D61967F63C7DD183914A4AE452C9F6AD5D462CE3D277798075B107615C1A8A30
• Step 7: Take the first 4 bytes of the second SHA-256 hash. This is the address
checksum
D61967F6
• Step 8: Add the 4 checksum bytes from the previous stage at the end of extended
RIPEMD-160 hash from stage 4. This is the 25-byte binary Bitcoin Address.
00010966776006953D5567439E5E39F86A0D273BEED61967F6
• Step 9: Convert the result from a byte string into a base58 string using
Base58Check encoding. This is the most commonly used Bitcoin Address format
16UwLL9Risc3QfPqBUvKofHmBQ7wMtjvM
13. 13
3. Additional reading and other resources
1. Blind Digital Signatures
http://www.hit.bme.hu/~buttyan/courses/BMEVIHIM219/2009/Chaum.BlindSigForPa
yment.1982.PDF
2. Bitcoin: A Peer-to-Peer Electronic Cash System
https://bitcoin.org/bitcoin.pdf
3. Bitcoin wiki
https://en.bitcoin.it/wiki/
4. FATF Report on Virtual Currencies Key Definitions and Potential AML/CFT Risks
http://www.fatf-gafi.org/media/fatf/documents/reports/Virtual-currency-key-
definitions-and-potential-aml-cft-risks.pdf
4. License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
License. You are free to:
Share — copy and redistribute the material in any medium or format
Adapt — remix, transform, and build upon the material for any purpose, even commercially.
The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
Attribution — You must give appropriate credit, provide a link to the license, and indicate if
changes were made. You may do so in any reasonable manner, but not in any way that suggests
the licensor endorses you or your use.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your
contributions under the same license as the original.
No additional restrictions — You may not apply legal terms or technological measures that
legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or
where your use is permitted by an applicable exception or limitation.
No warranties are given. The license may not give you all of the permissions necessary for your
intended use. For example, other rights such as publicity, privacy, or moral rights may limit how
you use the material.
Document version 1.0 dated 20th March, 2016.